Cloudanix home pagelight logodark logo
  • Community
  • Login
  1. AWS Audit
  2. Cloudwatch Audit
  • Overview
  • AWS
  • Azure
  • GCP
  • GitHub
  • AWS Introduction
    • Security of your AWS Account
  • AWS Audit
    • Getting Started with AWS Audit
    • Permissions required for Audit recipe
    • Ad-hoc running an Audit
    • API Gateway Audit
    • Cloudformation Audit
    • CloudFront Audit
    • CloudTrail Audit
    • Cloudwatch Audit
    • DynamoDB Audit
    • EC2 Audit
    • Elastic Search Audit
    • ELB Audit
    • IAM Audit
    • KMS Audit
    • Kubernetes Audit
    • Lambda Audit
    • RDS Audit
    • Redshift Audit
    • Route53 Audit
    • S3 Audit
    • Security Groups Audit
    • SES Audit
    • SNS Audit
  • Resources
    • AWS Services which determine your cost

AWS Audit

Edit this page
Raise an issue

Cloudwatch Audit

​
Checks performed

  • AWS CloudWatch Events Should Be Used
  • AWS Config Changes Alarm Should Be Enabled
  • AWS Console Sign In Without MFA Should Be Monitored
  • AWS Organizations Changes Alarm
  • Authorization Failures Alarm
  • CMK Disabled or Scheduled for Deletion Alarm
  • CloudTrail Changes Alarm
  • Console Sign-in Failures Alarm
  • EC2 Instance Changes Alarm
  • EC2 Large Instance Changes Alarm
  • IAM Policy Changes Alarm
  • Internet Gateway Changes Alarm
  • Network ACL Changes Alarm
  • Root Account Usage Alarm
  • Route Table Changes Alarm
  • S3 Bucket Changes Alarm
  • Security Group Changes Alarm
  • VPC Changes Alarm
  • Event Bus Should Not Be Exposed
  • EventBus Should Not Allow Cross Account Access
  • CloudWatch Alarm for VPC Flow Logs Metric Filter
  • Metric Filter for VPC Flow Logs CloudWatch Log Group
CloudTrail AuditDynamoDB Audit
Powered by Mintlify
githubtwitter
  • Checks performed